Cyber Crime Quiz Question
Cyber Crime Quiz Question
1. What type of cyber-crime, its law and punishments does section 66 of Indian IT hacks holds?
a. Cracking or illegally hack into any system
b. Putting antivirus into victim
c. Stealing data
d. Stealing hardware componets
2. You receive an email inviting you to apply for a compensation for financial losses during the pandemic. To
apply, you need to fill in a form with your personal details. What should you do?
a. Report it as phishing
b. Delete the message
c. Reply to the message and apply for the compensation scheme
d. Reply to the message telling the sender you won't fall for this trick
4. What is the name of the IT law that India is having in the Indian legislature?
a) India’s Technology (IT) Act, 2000
b) India’s Digital Information Technology (DIT) Act, 2000
c) India’s Information Technology (IT) Act, 2000
d) The Technology Act, 2008
Answer Malware
6. What is the primary purpose of a VPN (Virtual Private Network) in cyber security?
9. What type of software infects a machine, locks the files, then asks for money?
A. Worm
B. Trojan
C. Ransomware
D. Browser Hijacker
Answer: Ransomware
12. Which command can be used in DOS or Windows command Prompt to hide files?
A. Stealth [file/ directory]
B. Attrib +h [ file / directory]
C. Hide –h [file/ directory]
D. Attrib *h [ file / directory]
16. What is a group of computers networked together and used by hackers to steal information called?
A. Rootkit
B. Operating system
C. Botnet
D. DDos
Answer: Botnet
18. Which of the following is not a factor in securing the environment against an attack on security?
A. The education of the attacker
B. The system configuration
C. The network architecture
D. The business strategy of the company
21. What type of symmetric key algorithm using a streaming cipher to encrypt information?
A. RC$
B. Blowfish
C. SHA
D. MD5
Answer: RC$
22. What type of attack uses a fraudulent server with a relay address?
A. NTLM
B. MITM
C. NetBIOS
D. SMB
Answer: MITM
23. What type of attack uses a fraudulent server with a relay address?
A. Changing manufacturer, or recommended, settings of a newly installed application.
B. Additional unused features on commercial software packages.
C. Utilizing open source application code
D. Balancing security concerns with functionality and ease of use of a system.
Answer: ARIN